UCPATH HCM SECURITY APPROACH University of California PeopleSoft HCM Implementation Date: July 2013 Version: 1.0 Page 1 of 13 Document Control Change Record Date Author Version Change Reference July 2013 August 2013 Biv Ramlukan Randy Wilson 1.0 1.1 Initial release Incorporated feedback from Eric Goodman Reviewers Name Position Anthony Lo Mark Cianca Randy Wilson Pat Furze Doug Johnson Sharon Arce UC Project Manager UC Interim CIO UC Implementation Lead UC IT Lead Oracle Project Manager Oracle Technical Project Manager Page 2 of 13 Contents Document Control ..................................................................................................................... 2 Introduction ............................................................................................................................... 4 Purpose ............................................................................................................................... 4 Out of Scope for this Document ........................................................................................ 4 Key UCPath Security Principles ......................................................................................... 4 Assumptions ....................................................................................................................... 5 UCPath Security Overview ........................................................................................................ 6 Technical Design ................................................................................................................ 7 Role Matrix ......................................................................................................................... 8 Security Administration ..................................................................................................... 8 Dynamic Security ............................................................................................................... 9 Security Maintenance ...................................................................................................... 10 Row Security..................................................................................................................... 10 Query Security .................................................................................................................. 10 Batch Security .................................................................................................................. 11 Security Delegates ........................................................................................................... 11 Security – Business Perspective ....................................................................................... 11 Page 3 of 13 Introduction Security is critical for any PeopleSoft application. Typically, organizations do not allow any one department to have access to all of its applications. Similarly, they would not want everyone within a department to have access to all the functions or all the data of that particular application. In addition, the ability to customize the application objects, and change core and configuration data must also be controlled. PeopleSoft security allows organizations to set up controls within the system to limit what functions and tasks a user can perform as well as ensure that sensitive data, such as employee salaries, performance reviews, social security numbers, home addresses and phone numbers are protected. PeopleSoft security works with other network and database security to protect the PeopleSoft system from unauthorized access. Purpose The purpose of this document is to provide the strategy for the UCPath specific application security for PeopleSoft Human Capital Management (HCM) This strategy is a high level view of the approach to developing access and data security for the UCPath application and will inform the operational application security processes and procedures to be developed in order to support the system. This document focuses on outlining the approach to defining the application security architecture and the principles driving decisions related to security and access. It is recognized that there will be additional security requirements identified, related to specific locations, job function and data. The flexibility in the application's security design provides for capabilities to support a balance of access and security. Out of Scope for this Document Database Encryption Network Security Database Security Web Security – (e.g. SSL) Workstation Security LDAP Integration Web Services Security (Encryption) Portal Security Oracle Identity Federation integration Enwisen Security Key UCPath Security Principles The following are the key UCPath security principles that inform and drive decisions related to security and access: Job functions will change. As such, current security and access will be evaluated and will adjust to align with the changes in job function. Users will have application access only to the functions required to support their job. Users will have access to only the population of employees they are authorized to view. Page 4 of 13 Reporting access will be split into Report Writers and Report Viewers. Change management procedures will be established for the provisioning and deprovisioning of access. Business processes established during the implementation phase will be carried over to production. Assumptions Security will be based on business processes, job duties, responsibilities and positions, not individual users. Key functional users will be knowledgeable in the individual job tasks and duties for their functional area. The UCPath Project functional leads will be responsible for defining the access requirements for each area. The UCPath Project security lead will provide a template of the application navigation menus to the functional leads. Administration tasks will be divided between administrators at UCPath and at the campus level. The tasks will be later defined based on the available resources. Page 5 of 13 UCPath Security Overview Security Architecture The UCPath security model was designed using a Risk Based Approach. In this type of model, the primary objective is to isolate and focus administration on sensitive data and processes. A secondary benefit is a reduction in the overall administration effort to maintain security across multiple locations and departments. All Roles and Permission lists, custom and delivered, will be established to ensure that duplicate and redundant access will be eliminated. A user profile is required to access the PeopleSoft application. Each employee will be assigned a unique user profile with access to pages and processes required to do their job. In PeopleSoft Security Architecture, Pages are attached to Permission Lists, which are then attached to Roles. Access is granted to user, by assigning a Role to the employee’s User Profile. PEOPLESOFT+ARCHITECURE USER+PROFILE ROLEs PERMISSION+LISTs PAGES Functional Design User profiles will be created for each user requiring access to PeopleSoft. Security Roles will be built using roles based on the application access they need in order to perform their jobs within PeopleSoft. A standard set of Security Roles will be created for each functional area. The functionality contained within each security role will be defined by UCPath SME’s and will incorporate feedback received from each Location’s functional Subject Matter Experts (SMEs) along with appropriate audit/control stakeholders. Standardizing security roles for each functional area simplifies the Access Request procedure. Dynamic Roles To reduce the administration overhead, PeopleSoft Dynamic Role Assignment will be used to provision and de-provision roles for a user based on defined business rules. The dynamic role functionality will automatically assign a role based on the employee’s job/position (Base Employee and Core Functional roles) to users when they are hired, without the need for an administrator. Additional manual intervention is usually required to finalize many employees final security access within the application. This is a delivered feature. Page 6 of 13 Technical Design Permission Lists Permission lists will be identified by the following prefixes: o UC_ALL – identifies Master permission lists that contain all access to all pages of the Parent menu folder. o UC_P – identifies Public permission lists, which are similar to the Master permission lists, but do not contain access to sensitive data. o UC_R – identifies sensitive pages that have been removed from the Master permission lists and have a 1:1 ratio between a sensitive page and its associated permission list within all UC_### permission lists. o UC_RS – identifies Row Security permission lists that will grant a user access to specific departments in the department tree. PeopleSoft Security Profile Roles The security roles and permission lists are developed using a Risk Based approach intended to isolate and restrict application access to Sensitive Pages and grant access to the remaining pages that are considered safe to be shared by the main functional areas. An individual may have one to many roles, depending on their functional access and responsibilities. Sensitive Pages Pages that are identified as sensitive are assigned to their own permission lists. The pages are also removed from all other permission lists being used to ensure that access to the sensitive page can only be granted through a single permission list. This creates a one to one relationship between page and permission list. This method removes redundant or duplicate permissions and simplifies the administration process. The Security Administrator(s) will only have to add a single permission list to a user’s role when access is requested. The security model will contain three specific role types as described below: Base User Role The Base roles are a group of non-sensitive permission lists and will be assigned to all employees dynamically. The Base Role will provide access to Employee Self Service menus such as Personal Information, Benefits Summary, Emergency Contacts, W2 and I9 forms Core Functional Role The Core roles are a grouping of non-sensitive pages that are approved for all users within that functional area. For example Benefits, Payroll and HR will each have a separate Core role. Segregation of Duties Role (SOD) The SOD roles are a grouping of sensitive pages providing access for a Job or System Function. It should only be assigned to users within an office that have been approved to access the sensitive pages. For example, the ability to update the Job InformationCompensation page or Run the Payroll Process will be limited to only a select group of employees at the UCPath Center. These functions will therefore be built into SOD roles and only assigned to authorized users. Page 7 of 13 Role Matrix The Role Matrix below is an example of roles and the page permissions that will be associated to each role. In a facilitated process to be led by the UCPath PMO, each functional area will determine the final Role Names. The roles will be assigned permissions based on the feedback provided by the project functional leads in collaboration with UC users, who will need to determine the type of actions allowed (Read, Update, Correction) for each page that each role should have. The number of roles that can be defined to support a functional area is not limited, allowing Specialized Roles as described below to be created: The HCM application does not limit the number of roles that can be defined and created; within each functional area, there are also Specialized Roles as described below: Core Role – functionality that is approved for all users within a functional area. Master Role – access to all functions within a functional area. Used for testing and for leads. Delegate Role – access to a specific page or function for the purpose of supporting principal users. The following table is an example of the UCPC roles that will be created for the users administering Benefits: UCPC Level 1 Rep UCPC Level 2 Manager UCPC Level 3 Analyst Review ABBRs Read Read Read Review HR/Job/Payroll Data Read Read Read Update ABBRs Read Update Correct History Update Update Correct History Health Benefits Read Read Correct History Savings Plans Read Read Correct History Update Update Update Run Automated Event Processing None Update Update On-Demand Event Maintenance None Update Update COMPONENTS/ROLES BENEFITS Employee/Dependent Information Update Dependent/Beneficiary Enroll In Benefits Manage Automated Enrollment Participant Enrollment Perform Election Entry Events Security Administration Security Administration tasks will be shared between the Security Administrator(s) at the Systemwide and Campus levels, with their primary functions being different. The Systemwide Security Administrator will be responsible for building and maintaining new roles and permissions lists as required by the campuses, audit reporting, and executing Page 8 of 13 security tasks that have a global system effect. Depending on the complexity these may be developed within the systems testing environments and released into production through the Release Management Process after a Quality Assurance process is executed. Campus Security Administrators will be responsible for provisioning and deprovisioning of security roles. This separation of duties will allow Campus Security Administrators to respond to their local users while the systemwide shared services function monitors and maintains overall integrity of the existing security model. Distributed User Profiles PeopleSoft’s delivered Distributed User Profile functionality provides separation of duties required to support the following AWE: Initiator Approver 1 Approver 2 Approver 3 SMG Approver UCPath Approver AWE Approver Setup (number will vary from campus to campus ) AWE Administrator (a very small number at each campus) Remote Security Administrator For example the Remote Security Administrator will be responsible for provisioning and deprovisioning roles, but will not be able to make updates to the roles. The UCPath Administrator will maintain the content roles and permission lists. Dynamic Security Dynamic Role Assignment Dynamic Roles are a delivered feature of the PeopleSoft application security. Dynamic Role Assignment will be used to automate the provisioning and de-provisioning of user roles based on a set of defined business rules. The rules can be built to identify Department, Manager, Position, Job Code or a combination of these attributes that can be associated to a specific role. For example, if an employee changes jobs and becomes a manager in a new functional area: when the dynamic rule runs, the system removes the roles associated with the employee's previous functional area and adds the appropriate roles required for the new functional area. The use of Dynamic Role Assignments can significantly reduce the administration effort required to maintain security across multiple functional areas. It also mitigates the risk of users retaining function-specific security roles after they are no longer associated with a functional area. It is acknowledged that additional manual tuning of the final roles in addition to the automated assignment by DRA may be needed based on the specific user’s security requirements. Page 9 of 13 Security Maintenance Administration Tasks The following table contains a list of security-related administration tasks and a commonly used design of potential responsibility for the building and administration of those tasks. The table below identifies who will administer each area of security: ADMINISTRATION TASKS DESCRIPTION System Wide Security Standards Building and maintaining Roles and Permission Lists. Security Role Assignments Provisioning and de-provisioning of roles for UCPath Center. AWE Maintenance Maintenance of AWE related roles. AWE Administration Assignment of AWE related roles. Query Tree Building and maintaining query trees and access groups. X Department Tree Building and maintaining department tree for locations. X Batch Security Administration and monitoring of batch jobs. X Row Security Building and administration of row security permissions. X Reporting Tools Building and maintaining of reports for locations X Campus Location X X X X Row Security Row Security Row security is an independent layer of security that specifically controls access to Employee data. Even if a user has access to pages under JOB DATA, they must be setup with row security in order for them retrieve employee information. UCPath has implemented Department Tree based Row Security, which relies on the Business Unit and its underlying department hierarchy. Row security permission lists must be built with access to the Business Unit, which grant access to all the departments or grant access only to specific departments. The Row Security design and implementation is separate from the role access security that was discussed under the Role Matrix section of this document, but the two security designs are dependent on each other and work together to provide users access to their required pages, as well as the ability to view employee data within those pages. The design and build of the row security model matrix must also take into account the need for: A) Access to employee data that will be shared between Business Units. B) Access to employee data that will be shared between departments within the same Business Unit. Query Security Query Data Security Query data security is an independent layer of security that specifically controls access to the database tables when accessing these tables using PeopleSoft Query Viewer. The Query Security Trees for UCPath will be designed with the same methodology employed for application security. Tables that contain sensitive data (e.g., SSN, Page 10 of 13 Compensation, DOB, etc.) will be segregated into their own groups to clearly distinguish them from groups that contain public, non-sensitive data. Similar to application security, the employee data that a user can see is determined by the user’s row security. For example, in order for a user to run a report using PeopleSoft Query Viewer with employee Job information, the user must have row security permissions granting access to employees within a department and the user must be assigned access to the JOB_DATA table. The central team, working with the locations, will develop public queries and reports with Query Manager. The results will be presented in collaboratively designed reports and designated users will be assigned Query Viewer, which will allow them to run and view the reports. Where necessary, location-specific queries and reports will be created. Batch Security Batch Environment Security Batch processes may be run in a scheduled or ad hoc manner. For this project a third party tool, Control-M, has been designated as the enterprise scheduler to initiate and track batch process jobs. A profile will be created specifically to run batch jobs and will be independent of any user. To satisfy SOD controls, a separate profile will be created for each functional job set, e.g., Payroll, Benefits, etc. Batch interfaces will be scheduled to run automatically based on their individual process requirements. Access to Batch Security will only be granted to production support roles. Security Delegates Security Delegates Delegate roles will be developed to support senior leadership users who wish to delegate the approval or review of specific functions. These roles will be limited to accessing a specific page or function and will not include access for the entire component functionality. The functions identified by the functional leads will be used to develop the permission lists and delegate roles. Security – Business Perspective The following tables contain an explanation of terminology used to describe the Security Components, their associated functions and the systems in which user access will be administered. Terminology Security Component IDM / PeopleSoft User Profile Department Security (Row Level Security) Business Unit Description The PeopleSoft User Profile is automatically established upon hire into UCPath system. Roles must be removed from the PeopleSoft User Profile upon employee termination consistent with HR/HCM business rules. The Row Level Security determines the employee population that a user can see. The Department Tree will drive UCPath Row Security, with a separate Department Tree representing each Business Unit. A user could be assigned to all Business Units, all Departments within a Business Unit or only select Departments within a Business Unit. The user will be able to see all employees with departments that they have access to. A business unit in PeopleSoft allows multiple businesses to be setup within the same instance. Each Page 11 of 13 Query Trees PeopleSoft Security Roles ‘Reports To’ Relationship campus is identified by its own business unit in PeopleSoft. PeopleSoft uses Query Trees to control reporting access to the tables in the PeopleSoft database. Query Trees contain Access Groups to which the tables are assigned. Tables can be grouped together inside an Access Group, by the type of data they contain or based on the data requirements of a department. Standard security roles are defined, established and maintained systemwide. A person can be assigned to multiple PeopleSoft security roles. Security roles are both automatically and manually assigned to people. Automated Security Roles o Upon hire all employees will be assigned a security role that allows them access to employee inquiry and self service. o Employees will be assigned a security role that allows them access to the Manager Dashboard when a ‘reports to’ relationship is established. This security role will be removed when the ‘reports to’ role is removed. ‘Reports to’ information will be managed/maintained by the locations via the Position Management functionality in PeopleSoft. Page 12 of 13 Sample Security – Business Perspective System Component Description / Examples Security Component Utilized EMPLOYEE POPULATION PSFT Report HR Admin / User Power User All Employees Manager X X UC Path Portal Entry point to Knowledge Management, Case Management, and all PeopleSoft Functions IDM - Network ID (Single Sign-On) Person level Data* Visa/Permit * Security Clearance * Person Checklist * Disabilities Pages used to enter employee Citizenship/Visa, Background Check, E-Verify and employee Checklist data. IDM/PeopleSoft User Profile PeopleSoft Security Roles X X Person Org Summary Inquiry page with global access (No personal or pay data) IDM/PeopleSoft User Profile PeopleSoft Security Roles X X IDM/PeopleSoft User Profile PeopleSoft Security Roles X X IDM/PeopleSoft User Profile PeopleSoft Security Roles X X Person Profile OPA Administrative page Employee Self Service Position Data Administrative page to enter employee Person Profile Information (Degrees, License/Certifications) Administrative page to enter employee OPA information. Used for SMG and Deans/Faculty Admin. Examples of self-service functions include: Name/Address change Person Profile Benefits enrollment Direct Deposit change Pages used to maintain Position Data. Campuses will have direct access to the native pages. Template Based Hire * TBH Status Page Templates used to Hire, Rehire, Add Contingent Workers Workforce Job Summary Inquiry page for campuses w/ security. This access is controlled by a user’s department security. UC Employee Review Page used to enter employee review information Assign Group Increases Page used to review and approve group increases Manager Dashboard *Org Chart Viewer HCM related manager self service transactions: Time Management Job Info Personal info Manager Actions / AWE Ability to approve, deny transactions HR Analytics PeopleSoft Query (Pre-defined) Provides Workforce Information on employees for: Employee Performance Turnover Absenteeism Query Viewer – Launch existing queries IDM/PeopleSoft User Profile PeopleSoft Security Roles IDM/PeopleSoft User Profile PeopleSoft Security Roles Department Security IDM/PeopleSoft User Profile PeopleSoft Security Roles Department Security IDM/PeopleSoft User Profile PeopleSoft Security Roles Department Security IDM/PeopleSoft User Profile PeopleSoft Security Roles IDM/PeopleSoft User Profile PeopleSoft Security Roles PeopleSoft Group Security IDM/PeopleSoft User Profile PeopleSoft Security Roles ‘Reports To’ Relationship Access to Direct Reports IDM/PeopleSoft User Profile PeopleSoft Security Roles Custom AWE Workflow Roles Department Security X IDM PeopleSoft Security Roles Query Trees Department Security X X X X X X X X X X X X X X (If Approver) X IDM/PeopleSoft User Profile PeopleSoft Security Roles Business Unit Security X FIN/GL Users X X X Page 13 of 13 X X X
© Copyright 2026 Paperzz